Security researches have disclosed a proof of concept which shows how it is possible to compromise clients via RDP. In order to exploit the clients, the attackers make use of vulnerability in the RDP clipboard ...